![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessInterpretation of Swedish Sign Language Using Convolutional Neural Networks and Transfer Learning
The automatic interpretation of sign languages is a challenging task, as it requires the usage of high-level vision and high-level motion processing systems for providing accurate image perception. In this pap...
-
Article
Open AccessA comprehensive study of bloated dependencies in the Maven ecosystem
Build automation tools and package managers have a profound influence on software development. They facilitate the reuse of third-party libraries, support a clear separation between the application’s code and ...
-
Article
An approach and benchmark to detect behavioral changes of commits in continuous integration
When a developer pushes a change to an application’s codebase, a good practice is to have a test case specifying this behavioral change. Thanks to continuous integration (CI), the test is run on subsequent com...
-
Chapter and Conference Paper
Constraint-Based Software Diversification for Efficient Mitigation of Code-Reuse Attacks
Modern software deployment process produces software that is uniform, and hence vulnerable to large-scale code-reuse attacks. Compiler-based diversification improves the resilience and security of software system...
-
Article
Open AccessA journey among Java neutral program variants
Neutral program variants are alternative implementations of a program, yet equivalent with respect to the test suite. Techniques such as approximate computing or genetic improvement share the intuition that poten...
-
Article
Automatic test improvement with DSpot: a study with ten mature open-source projects
In the literature, there is a rather clear segregation between manually written tests by developers and automatically generated ones. In this paper, we explore a third solution: to automatically improve existi...
-
Article
A comprehensive study of pseudo-tested methods
Pseudo-tested methods are defined as follows: they are covered by the test suite, yet no test case fails when the method body is removed, i.e., when all the effects of this method are suppressed. This intrigui...
-
Article
Open AccessTest them all, is it worth it? Assessing configuration sampling on the JHipster Web development stack
Many approaches for testing configurable software systems start from the same assumption: it is impossible to test all configurations. This motivated the definition of variability-aware abstractions and sampli...
-
Article
Modeling variability in the video domain: language and experience report
In an industrial project, we addressed the challenge of develo** a software-based video generator such that consumers and providers of video processing algorithms can benchmark them on a wide range of video ...
-
Article
Open AccessAdvanced and efficient execution trace management for executable domain-specific modeling languages
Executable Domain-Specific Modeling Languages (xDSMLs) enable the application of early dynamic verification and validation (V&V) techniques for behavioral models. At the core of such techniques, execution traces ...
-
Chapter and Conference Paper
Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting
In this paper, we present the first fingerprinti...
-
Article
Correctness attraction: a study of stability of software behavior under runtime perturbation
Can the execution of software be perturbed without breaking the correctness of the output? In this paper, we devise a protocol to answer this question from a novel perspective. In an experimental study, we obs...
-
Article
Online Genetic Improvement on the java virtual machine with ECSELR
Online Genetic Improvement embeds the ability to evolve and adapt inside a target software system enabling it to improve at runtime without any external dependencies or human intervention. We recently develope...
-
Chapter and Conference Paper
FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques
The rich programming interfaces (APIs) provided by web browsers can be diverted to collect a browser fingerprint. A small number of queries on these interfaces are sufficient to build a fingerprint that is sta...
-
Article
Breathing ontological knowledge into feature model synthesis: an empirical study
Feature Models (FMs) are a popular formalism for modeling and reasoning about the configurations of a software product line. As the manual construction of an FM is time-consuming and error-prone, management op...
-
Chapter and Conference Paper
Puzzle: A Tool for Analyzing and Extracting Specification Clones in DSLs
The use of domain-specific languages (DSLs) is a successful technique in the development of complex systems. Indeed, the construction of new DSLs addressing the particular needs of software projects has become...
-
Chapter and Conference Paper
Reverse-Engineering Reusable Language Modules from Legacy Domain-Specific Languages
The use of domain-specific languages (DSLs) has become a successful technique in the development of complex systems. Nevertheless, the construction of this type of languages is time-consuming and requires high...
-
Article
Generating counterexamples of model-based software product lines
In a model-based software product line (MSPL), the variability of the domain is characterized in a variability model and the core artifacts are base models conforming to a modeling language (also called metamo...
-
Article
Kompren: modeling and generating model slicers
Among model comprehension tools, model slicers are tools that extract a subset of model elements, for a specific purpose. Model slicers provide a mechanism to isolate and focus on parts of the model, thereby i...
-
Chapter and Conference Paper
A Generative Approach to Define Rich Domain-Specific Trace Metamodels
Executable Domain-Specific Modeling Languages (xDSMLs) open many possibilities for performing early verification and validation (V&V) of systems. Dynamic V&V approaches rely on execution traces, which represen...